|
|
|
package consensus
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/harmony-one/harmony/crypto/bls"
|
|
|
|
|
|
|
|
msg_pb "github.com/harmony-one/harmony/api/proto/message"
|
|
|
|
"github.com/harmony-one/harmony/internal/utils"
|
|
|
|
"github.com/harmony-one/harmony/p2p"
|
|
|
|
"github.com/harmony-one/harmony/p2p/p2pimpl"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestNew(test *testing.T) {
|
|
|
|
leader := p2p.Peer{IP: "127.0.0.1", Port: "9902"}
|
|
|
|
validator := p2p.Peer{IP: "127.0.0.1", Port: "9905"}
|
|
|
|
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
|
|
|
|
host, err := p2pimpl.NewHost(&leader, priKey)
|
|
|
|
if err != nil {
|
|
|
|
test.Fatalf("newhost failure: %v", err)
|
|
|
|
}
|
|
|
|
consensus := New(host, 0, []p2p.Peer{leader, validator}, leader, bls.RandPrivateKey())
|
|
|
|
if consensus.consensusID != 0 {
|
|
|
|
test.Errorf("Consensus Id is initialized to the wrong value: %d", consensus.consensusID)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !consensus.IsLeader {
|
|
|
|
test.Error("Consensus should belong to a leader")
|
|
|
|
}
|
|
|
|
|
|
|
|
if consensus.ReadySignal == nil {
|
|
|
|
test.Error("Consensus ReadySignal should be initialized")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRemovePeers(t *testing.T) {
|
|
|
|
pk1 := bls.RandPrivateKey().GetPublicKey()
|
|
|
|
pk2 := bls.RandPrivateKey().GetPublicKey()
|
|
|
|
pk3 := bls.RandPrivateKey().GetPublicKey()
|
|
|
|
pk4 := bls.RandPrivateKey().GetPublicKey()
|
|
|
|
pk5 := bls.RandPrivateKey().GetPublicKey()
|
|
|
|
|
|
|
|
p1 := p2p.Peer{IP: "127.0.0.1", Port: "19901", ConsensusPubKey: pk1}
|
|
|
|
p2 := p2p.Peer{IP: "127.0.0.1", Port: "19902", ConsensusPubKey: pk2}
|
|
|
|
p3 := p2p.Peer{IP: "127.0.0.1", Port: "19903", ConsensusPubKey: pk3}
|
|
|
|
p4 := p2p.Peer{IP: "127.0.0.1", Port: "19904", ConsensusPubKey: pk4}
|
|
|
|
|
|
|
|
peers := []p2p.Peer{p1, p2, p3, p4}
|
|
|
|
|
|
|
|
peerRemove := []p2p.Peer{p1, p2}
|
|
|
|
|
|
|
|
leader := p2p.Peer{IP: "127.0.0.1", Port: "9000", ConsensusPubKey: pk5}
|
|
|
|
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
|
|
|
|
host, err := p2pimpl.NewHost(&leader, priKey)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("newhost failure: %v", err)
|
|
|
|
}
|
|
|
|
consensus := New(host, 0, peers, leader, nil)
|
|
|
|
|
|
|
|
// consensus.DebugPrintPublicKeys()
|
|
|
|
f := consensus.RemovePeers(peerRemove)
|
|
|
|
if f == 0 {
|
|
|
|
t.Errorf("consensus.RemovePeers return false")
|
|
|
|
consensus.DebugPrintPublicKeys()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestGetPeerFromID(t *testing.T) {
|
|
|
|
leaderPriKey := bls.RandPrivateKey()
|
|
|
|
leaderPubKey := leaderPriKey.GetPublicKey()
|
|
|
|
validatorPubKey := bls.RandPrivateKey().GetPublicKey()
|
|
|
|
leader := p2p.Peer{IP: "127.0.0.1", Port: "9902", ConsensusPubKey: leaderPubKey}
|
|
|
|
validator := p2p.Peer{IP: "127.0.0.1", Port: "9905", ConsensusPubKey: validatorPubKey}
|
|
|
|
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
|
|
|
|
host, err := p2pimpl.NewHost(&leader, priKey)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("newhost failure: %v", err)
|
|
|
|
}
|
|
|
|
consensus := New(host, 0, []p2p.Peer{leader, validator}, leader, leaderPriKey)
|
|
|
|
leaderAddress := utils.GetAddressFromBlsPubKey(leader.ConsensusPubKey)
|
|
|
|
validatorAddress := utils.GetAddressFromBlsPubKey(validator.ConsensusPubKey)
|
|
|
|
l := consensus.GetPeerByAddress(leaderAddress.Hex())
|
|
|
|
v := consensus.GetPeerByAddress(validatorAddress.Hex())
|
|
|
|
if l.IP != leader.IP || l.Port != leader.Port {
|
|
|
|
t.Errorf("leader IP not equal")
|
|
|
|
}
|
|
|
|
if v.IP != validator.IP || v.Port != validator.Port {
|
|
|
|
t.Errorf("validator IP not equal")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPopulateMessageFields(t *testing.T) {
|
|
|
|
leader := p2p.Peer{IP: "127.0.0.1", Port: "9902"}
|
|
|
|
validator := p2p.Peer{IP: "127.0.0.1", Port: "9905"}
|
|
|
|
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
|
|
|
|
host, err := p2pimpl.NewHost(&leader, priKey)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("newhost failure: %v", err)
|
|
|
|
}
|
|
|
|
blsPriKey := bls.RandPrivateKey()
|
|
|
|
consensus := New(host, 0, []p2p.Peer{leader, validator}, leader, blsPriKey)
|
|
|
|
consensus.consensusID = 2
|
|
|
|
consensus.blockHash = blockHash
|
|
|
|
|
|
|
|
msg := &msg_pb.Message{
|
|
|
|
Request: &msg_pb.Message_Consensus{
|
|
|
|
Consensus: &msg_pb.ConsensusRequest{},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
consensusMsg := msg.GetConsensus()
|
|
|
|
consensus.populateMessageFields(consensusMsg)
|
|
|
|
|
|
|
|
if consensusMsg.ConsensusId != 2 {
|
|
|
|
t.Errorf("Consensus ID is not populated correctly")
|
|
|
|
}
|
|
|
|
if !bytes.Equal(consensusMsg.BlockHash[:], blockHash[:]) {
|
|
|
|
t.Errorf("Block hash is not populated correctly")
|
|
|
|
}
|
|
|
|
if bytes.Compare(consensusMsg.SenderPubkey, blsPriKey.GetPublicKey().Serialize()) != 0 {
|
|
|
|
t.Errorf("Sender ID is not populated correctly")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSignAndMarshalConsensusMessage(t *testing.T) {
|
|
|
|
leader := p2p.Peer{IP: "127.0.0.1", Port: "9902"}
|
|
|
|
validator := p2p.Peer{IP: "127.0.0.1", Port: "9905"}
|
|
|
|
priKey, _, _ := utils.GenKeyP2P("127.0.0.1", "9902")
|
|
|
|
host, err := p2pimpl.NewHost(&leader, priKey)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("newhost failure: %v", err)
|
|
|
|
}
|
|
|
|
consensus := New(host, 0, []p2p.Peer{leader, validator}, leader, bls.RandPrivateKey())
|
|
|
|
consensus.consensusID = 2
|
|
|
|
consensus.blockHash = blockHash
|
|
|
|
consensus.SelfAddress = "fake address"
|
|
|
|
|
|
|
|
msg := &msg_pb.Message{}
|
|
|
|
marshaledMessage, err := consensus.signAndMarshalConsensusMessage(msg)
|
|
|
|
|
|
|
|
if err != nil || len(marshaledMessage) == 0 {
|
|
|
|
t.Errorf("Failed to sign and marshal the message: %s", err)
|
|
|
|
}
|
|
|
|
if len(msg.Signature) == 0 {
|
|
|
|
t.Error("No signature is signed on the consensus message.")
|
|
|
|
}
|
|
|
|
}
|